Jinoh Kim

Orcid: 0000-0002-9835-1866

According to our database1, Jinoh Kim authored at least 90 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Base station gateway to secure user channel access at the first hop edge.
Comput. Networks, 2024

Detecting Anomalies in Time Series Using Kernel Density Approaches.
IEEE Access, 2024

Wireless Link Routing to Secure Against Fake Base Station in 5G.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Toward Post-Quantum Digital Certificate for eSIM.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Anomaly Detection in 5G using Variational Autoencoders.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Flying Base Station Channel Capacity.
Proceedings of the Seventh International Workshop on Systems and Network Telemetry and Analytics, 2024

Intelligent Trajectory-based Approach to UAV Location Integrity Checks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Fake Base Station Detection and Blacklisting.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture.
IEEE Trans. Netw. Serv. Manag., September, 2023

Securing UAV Flying Base Station for Mobile Networking: A Review.
Future Internet, May, 2023

Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Leveraging History to Predict Infrequent Abnormal Transfers in Distributed Workflows.
Sensors, 2023

Reliable Detection of Location Spoofing and Variation Attacks.
IEEE Access, 2023

An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Evaluating Unbalanced Network Data for Attack Detection.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023

Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023

Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Version++: Cryptocurrency Blockchain Handshaking With Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
Dataset, December, 2022

A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022

Message from the Chairs of the WAIN workshop 2021.
SIGMETRICS Perform. Evaluation Rev., 2022

Enhancing IoT anomaly detection performance for federated learning.
Digit. Commun. Networks, 2022

5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
CoRR, 2022

Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022

Lightweight Code Assurance Proof for Wireless Software.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

Deep Sequence Models for Packet Stream Analysis and Early Decisions.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Predicting Slow Network Transfers in Scientific Computing.
Proceedings of the SNTA@HPDC 2022, 2022

SNTA'22: The 5th Workshop on Systems and Network Telemetry and Analytics.
Proceedings of the HPDC '22: The 31st International Symposium on High-Performance Parallel and Distributed Computing, Minneapolis, MN, USA, 27 June 2022, 2022

2021
Automated Feature Selection for Anomaly Detection in Network Traffic Data.
ACM Trans. Manag. Inf. Syst., 2021

Network traffic performance analysis from passive measurements using gradient boosting machine learning.
Int. J. Big Data Intell., 2021

Clustering-based label estimation for network anomaly detection.
Digit. Commun. Networks, 2021

Improving Botnet Detection with Recurrent Neural Network and Transfer Learning.
CoRR, 2021

Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Robust P2P Connectivity Estimation for Permissionless Bitcoin Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

A Scalable Learning Model for Multi-seasonal Time Series Forecasting.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Performance Analyses for Applying Machine Learning on Bitcoin Miners.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Zero-day Malware Detection using Threshold-free Autoencoding Architecture.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Learning-based dynamic cache management in a cloud.
J. Parallel Distributed Comput., 2020

QoS-enabled Cache Architecture for a Private Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

A Learning-based Data Augmentation for Network Anomaly Detection.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Evaluation of Deep Learning Models for Network Performance Prediction for Scientific Facilities.
Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, 2020

Transfer Learning Approach for Botnet Detection Based on Recurrent Variational Autoencoder.
Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, 2020

Botnet Detection Using Recurrent Variational Autoencoder.
Proceedings of the IEEE Global Communications Conference, 2020

2019
A New Approach to Multivariate Network Traffic Analysis.
J. Comput. Sci. Technol., 2019

Improving signature quality for network application identification.
Digit. Commun. Networks, 2019

An Ensemble Approach toward Automated Variable Selection for Network Anomaly Detection.
CoRR, 2019

A Hybrid Cache Architecture for Meeting Per-Tenant Performance Goals in a Private Cloud.
CoRR, 2019

Multivariate network traffic analysis using clustered patterns.
Computing, 2019

A survey of deep learning-based network anomaly detection.
Clust. Comput., 2019

An Empirical Evaluation of Deep Learning for Network Anomaly Detection.
IEEE Access, 2019

Automatic Detection of Network Traffic Anomalies and Changes.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

Session details: Keynote Speech.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

Federated Wireless Network Intrusion Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Website Fingerprinting Attack Mitigation Using Traffic Morphing.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

An Encoding Technique for CNN-based Network Anomaly Detection.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
A lightweight network anomaly detection technique.
Proceedings of the 2017 International Conference on Computing, 2017

An approach to online network monitoring using clustered patterns.
Proceedings of the 2017 International Conference on Computing, 2017

A New Approach to Online, Multivariate Network Traffic Analysis.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2015
Exploiting Replication for Energy-Aware Scheduling in Disk Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Incorporating multiple cluster models for network traffic classification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Scalable Security Event Aggregation for Situation Analysis.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Security for the scientific data services framework.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
iPACS: Power-aware covering sets for energy proportionality and performance in data parallel computing clusters.
J. Parallel Distributed Comput., 2014

A Hybrid Classifier with a Binning Method for Network Application Identification.
J. Integr. Des. Process. Sci., 2014

A Security-enabled Grid System for MINDS Distributed Data Mining.
J. Grid Comput., 2014

2013
Reconciling Multiple Matches for the Signature-Based Application Identification.
J. Commun., 2013

2012
Energy-Saving Techniques for Disk Storage Systems.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

FREP: Energy proportionality for disk storage using replication.
J. Parallel Distributed Comput., 2012

2011
Passive Network Performance Estimation for Large-Scale, Data-Intensive Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Energy Proportionality and Performance in Data Parallel Computing Clusters.
Proceedings of the Scientific and Statistical Database Management, 2011

Parallel in situ indexing for data-intensive computing.
Proceedings of the IEEE Symposium on Large Data Analysis and Visualization, 2011

Energy-Aware Scheduling in Disk Storage Systems.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Energy proportionality for disk storage using replication.
Proceedings of the EDBT 2011, 2011

2010
Using Replication for Energy Conservation in RAID Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

2009
Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2009

2008
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
NGS: Service Adaptation in Open Grid Platforms.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing.
Proceedings of the Computational Science, 2007

Exploiting Heterogeneity for Collective Data Downloading in Volunteer-based Networks.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2005
Design and Implementation of Policy Decision Point in Policy-Based Network.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Role-based policy distribution techniques in policy-based networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003

Applying Data Mining Techniques to Analyze Alert Data.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003

2002
Policy-Based Intrusion Detection and Automated Response Mechanism.
Proceedings of the Information Networking, 2002


  Loading...